Search dblp for Publications

export results for "toc:db/conf/csfw/csf2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csfw/AgtenSJP12,
  author       = {Pieter Agten and
                  Raoul Strackx and
                  Bart Jacobs and
                  Frank Piessens},
  editor       = {Stephen Chong},
  title        = {Secure Compilation to Modern Processors},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {171--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.12},
  doi          = {10.1109/CSF.2012.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AgtenSJP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AlvimCPS12,
  author       = {M{\'{a}}rio S. Alvim and
                  Konstantinos Chatzikokolakis and
                  Catuscia Palamidessi and
                  Geoffrey Smith},
  editor       = {Stephen Chong},
  title        = {Measuring Information Leakage Using Generalized Gain Functions},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {265--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.26},
  doi          = {10.1109/CSF.2012.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AlvimCPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArapinisCD12,
  author       = {Myrto Arapinis and
                  Vincent Cheval and
                  St{\'{e}}phanie Delaune},
  editor       = {Stephen Chong},
  title        = {Verifying Privacy-Type Properties in a Modular Way},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {95--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.16},
  doi          = {10.1109/CSF.2012.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArapinisCD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AskarovC12,
  author       = {Aslan Askarov and
                  Stephen Chong},
  editor       = {Stephen Chong},
  title        = {Learning is Change in Knowledge: Knowledge-Based Security for Dynamic
                  Policies},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {308--322},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.31},
  doi          = {10.1109/CSF.2012.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AskarovC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesBBGKSB12,
  author       = {Michael Backes and
                  Gilles Barthe and
                  Matthias Berg and
                  Benjamin Gr{\'{e}}goire and
                  C{\'{e}}sar Kunz and
                  Malte Skoruppa and
                  Santiago Zanella B{\'{e}}guelin},
  editor       = {Stephen Chong},
  title        = {Verified Security of Merkle-Damg{\aa}rd},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {354--368},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.14},
  doi          = {10.1109/CSF.2012.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesBBGKSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesGKM12,
  author       = {Michael Backes and
                  Ian Goldberg and
                  Aniket Kate and
                  Esfandiar Mohammadi},
  editor       = {Stephen Chong},
  title        = {Provably Secure and Practical Onion Routing},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {369--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.32},
  doi          = {10.1109/CSF.2012.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesGKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BalliuDG12,
  author       = {Musard Balliu and
                  Mads Dam and
                  Gurvan Le Guernic},
  editor       = {Stephen Chong},
  title        = {ENCoVer: Symbolic Exploration for Information Flow Security},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {30--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.24},
  doi          = {10.1109/CSF.2012.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BalliuDG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BansalBM12,
  author       = {Chetan Bansal and
                  Karthikeyan Bhargavan and
                  Sergio Maffeis},
  editor       = {Stephen Chong},
  title        = {Discovering Concrete Attacks on Website Authorization by Formal Analysis},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {247--262},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.27},
  doi          = {10.1109/CSF.2012.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BansalBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BartheBCL12,
  author       = {Gilles Barthe and
                  Gustavo Betarte and
                  Juan Diego Campo and
                  Carlos Luna},
  editor       = {Stephen Chong},
  title        = {Cache-Leakage Resilient {OS} Isolation in an Idealized Model of Virtualization},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {186--197},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.17},
  doi          = {10.1109/CSF.2012.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BartheBCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Blanchet12,
  author       = {Bruno Blanchet},
  editor       = {Stephen Chong},
  title        = {Automatically Verified Mechanized Proof of One-Encryption Key Exchange},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {325--339},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.8},
  doi          = {10.1109/CSF.2012.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Blanchet12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BugliesiCFS12,
  author       = {Michele Bugliesi and
                  Stefano Calzavara and
                  Riccardo Focardi and
                  Marco Squarcina},
  editor       = {Stephen Chong},
  title        = {Gran: Model Checking Grsecurity {RBAC} Policies},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {126--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.29},
  doi          = {10.1109/CSF.2012.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BugliesiCFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DaubignardFL12,
  author       = {Marion Daubignard and
                  Pierre{-}Alain Fouque and
                  Yassine Lakhnech},
  editor       = {Stephen Chong},
  title        = {Generic Indifferentiability Proofs of Hash Designs},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {340--353},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.13},
  doi          = {10.1109/CSF.2012.13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DaubignardFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FerraraMP12,
  author       = {Anna Lisa Ferrara and
                  P. Madhusudan and
                  Gennaro Parlato},
  editor       = {Stephen Chong},
  title        = {Security Analysis of Role-Based Access Control through Program Verification},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {113--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.28},
  doi          = {10.1109/CSF.2012.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FerraraMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GenoveseGR12,
  author       = {Valerio Genovese and
                  Deepak Garg and
                  Daniele Rispoli},
  editor       = {Stephen Chong},
  title        = {Labeled Sequent Calculi for Access Control Logics: Countermodels,
                  Saturation and Abduction},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {139--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.11},
  doi          = {10.1109/CSF.2012.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GenoveseGR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HedinS12,
  author       = {Daniel Hedin and
                  Andrei Sabelfeld},
  editor       = {Stephen Chong},
  title        = {Information-Flow Security for a Core of JavaScript},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {3--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.19},
  doi          = {10.1109/CSF.2012.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HedinS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KordyR12,
  author       = {Barbara Kordy and
                  Sasa Radomirovic},
  editor       = {Stephen Chong},
  title        = {Constructing Optimistic Multi-party Contract Signing Protocols},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {215--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.23},
  doi          = {10.1109/CSF.2012.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KordyR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersTG12,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Juergen Graf},
  editor       = {Stephen Chong},
  title        = {A Framework for the Cryptographic Verification of Java-Like Programs},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {198--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.9},
  doi          = {10.1109/CSF.2012.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LuoR12,
  author       = {Zhengqin Luo and
                  Tamara Rezk},
  editor       = {Stephen Chong},
  title        = {Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {157--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.22},
  doi          = {10.1109/CSF.2012.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/LuoR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MalacariaS12,
  author       = {Pasquale Malacaria and
                  Fabrizio Smeraldi},
  editor       = {Stephen Chong},
  title        = {The Thermodynamics of Confidentiality},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {280--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.18},
  doi          = {10.1109/CSF.2012.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MalacariaS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Mitchell0SZ12,
  author       = {John C. Mitchell and
                  Rahul Sharma and
                  Deian Stefan and
                  Joe Zimmerman},
  editor       = {Stephen Chong},
  title        = {Information-Flow Control for Programming on Encrypted Data},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {45--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.30},
  doi          = {10.1109/CSF.2012.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Mitchell0SZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PankovaL12,
  author       = {Alisa Pankova and
                  Peeter Laud},
  editor       = {Stephen Chong},
  title        = {Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {63--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.10},
  doi          = {10.1109/CSF.2012.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PankovaL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RafnssonHS12,
  author       = {Willard Rafnsson and
                  Daniel Hedin and
                  Andrei Sabelfeld},
  editor       = {Stephen Chong},
  title        = {Securing Interactive Programs},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {293--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.15},
  doi          = {10.1109/CSF.2012.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RafnssonHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SchmidtMCB12,
  author       = {Benedikt Schmidt and
                  Simon Meier and
                  Cas Cremers and
                  David A. Basin},
  editor       = {Stephen Chong},
  title        = {Automated Analysis of Diffie-Hellman Protocols and Advanced Security
                  Properties},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {78--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.25},
  doi          = {10.1109/CSF.2012.25},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SchmidtMCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SprengerB12,
  author       = {Christoph Sprenger and
                  David A. Basin},
  editor       = {Stephen Chong},
  title        = {Refining Key Establishment},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {230--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.21},
  doi          = {10.1109/CSF.2012.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/SprengerB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/VaughanM12,
  author       = {Jeffrey A. Vaughan and
                  Todd D. Millstein},
  editor       = {Stephen Chong},
  title        = {Secure Information Flow for Concurrent Programs under Total Store
                  Order},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {19--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.20},
  doi          = {10.1109/CSF.2012.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/VaughanM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2012,
  editor       = {Stephen Chong},
  title        = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6265867/proceeding},
  isbn         = {978-1-4673-1918-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics